debatem1 / pypbc
A defunct and ancient set of python bindings for Pairing Based Cryptography
☆52Updated last year
Alternatives and similar repositories for pypbc:
Users that are interested in pypbc are comparing it to the libraries listed below
- ☆27Updated 6 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆41Updated 6 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆34Updated 3 years ago
- ☆20Updated 6 years ago
- multi-authority attribute based encryption☆43Updated 4 years ago
- Maintain a list of open source libraries of cryptographic excellence☆61Updated 2 years ago
- Multi-Authority Policy-based Chameleon Hash☆13Updated 4 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆97Updated 3 years ago
- Boolean Query SSE schemes☆16Updated 6 years ago
- Attribute-based Encryption☆198Updated 4 years ago
- Implementation of "Reading in the Dark: Classifying Encrypted Digits with Functional Encryption"☆19Updated last year
- Paper Notes in MPC with Applications to PPML☆69Updated last year
- C++ OT extension implementation☆127Updated 4 years ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆17Updated 9 months ago
- Traceable and Revocable Attribute-based Encryption in Java☆50Updated 6 years ago
- Publicly Accountable Fine-Grained Blockchain Rewriting in Permissionless Setting☆17Updated 3 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆97Updated last year
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆59Updated 8 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- LSSS, ABE☆15Updated 4 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 6 years ago
- The Description of the project you can watch my blog☆35Updated 4 years ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆14Updated 3 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆32Updated 2 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆82Updated 2 years ago
- Attribute-based Encryption☆23Updated last year
- 可编辑区块链,基于以太坊智能合约的区块编辑抽象层,利用变色龙哈希实现对过去区块的修改删除等操作☆14Updated 4 years ago
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- fabric blockchain with medical data using privacy preserving technology☆11Updated 4 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago